cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-23900,https://securityvulnerability.io/vulnerability/CVE-2024-23900,,"Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers.",Jenkins,Jenkins Matrix Project Plugin,4.3,MEDIUM,0.0004900000058114529,false,false,false,false,,false,false,2024-01-24T17:52:24.770Z,0 CVE-2022-20615,https://securityvulnerability.io/vulnerability/CVE-2022-20615,,"Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.",Jenkins,Jenkins Matrix Project Plugin,5.4,MEDIUM,0.0007399999885819852,false,false,false,false,,false,false,2022-01-12T19:05:49.000Z,0 CVE-2020-2225,https://securityvulnerability.io/vulnerability/CVE-2020-2225,,"Jenkins Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes, resulting in a stored cross-site scripting vulnerability.",Jenkins,Jenkins Matrix Project Plugin,5.4,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2020-07-15T17:00:28.000Z,0 CVE-2020-2224,https://securityvulnerability.io/vulnerability/CVE-2020-2224,,"Jenkins Matrix Project Plugin 1.16 and earlier does not escape the node names shown in tooltips on the overview page of builds with a single axis, resulting in a stored cross-site scripting vulnerability.",Jenkins,Jenkins Matrix Project Plugin,5.4,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2020-07-15T17:00:27.000Z,0 CVE-2019-1003031,https://securityvulnerability.io/vulnerability/CVE-2019-1003031,,"A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.",Jenkins,Jenkins Matrix Project Plugin,9.9,CRITICAL,0.0038399999029934406,false,false,false,false,,false,false,2019-03-08T21:00:00.000Z,0